Freeware Files | Download Free Software

Thursday, 10 November 2011 17:19

Boost Your Computer Security With Ten Easy Steps

Rate this item
(10 votes)

In our days worldwide web is very dangerous for novice users and it’s very easy to get infected or even lost important data.

Nowadays, computers are part of our office or household furniture. However, we all have increasing amounts of valuable data stored on our computers and it's worth being aware of the ongoing risks, so here we will take a look at the best ways to improve and immunize our PC security. 

 Of course adding some computer security features to a pc costs a little extra money.

It is essential to do to keep off attacks from the rogues out there determined to trouble home pc users as well as large companies. Viruses can modify in seriousness such as harmless but annoying e-mails or Spam applications delivered to PCs that can wipe out all the data stored on a computer.


Ten steps to follow - Improve your computer security: 

1.Operating System: Whatever operating system you use, keep it updated frequently. For example, turning on the auto-update in Windows will boost your security. Microsoft releases frequent fixes to assailable areas of OS security so this is critically important.

2. Password Protection: Another good step to computer security is to put a holdback to unauthorized persons, use your computer. You can protect your login-id with a password. With this step you can ensure that only you can access confidential information on your computer. Never reveal your passwords to other users, do not write them down. Try to make your passwords unique with a combination of uppercase/lowercase letters, numbers and symbols.

3. Firewall Protection: Your computer security should be enhanced also, by adding a firewall, especially if you are part of a home or work network. The firewall or NAT setting on your router should be switched on as these could leave you exposed to crackers or indeed your neighbors might be able to view, what you are doing on the internet.

4. Antivirus Program: Ensure your pc has up to date anti-virus software installed. This is a key element of computer security and will help detect and remove viruses, malware, as well as block Spam e-mails.

5. Regular Scan: Your anti-virus software may do regular background scans, but it’s a good idea to run manually at least once a week. This will help clean up your system by deleting unwanted cookies and temporary internet files.

6. E-Mail Links: Don’t visit websites by clicking links attached to e-mails. Most of these links taking you to a home page asking for login or account details are scams. Any details entered here can be used by the hacker who set up the scam link.

7. E-Mail Attachments: Be very wary of attachments to e-mails sent to you, particularly if they are from persons unknown to you. These could potentially carry a virus that will prove damaging to your computer. A good computer security tip is to ignore attachments from unknown sources and delete the e-mail. You can save any attachments or downloads to your desktop and scan them with the anti-virus software.

8. Suspicious E-Mails: This breach of computer security is sometimes known as phishing. Ignore every e-mails that look fishy and delete them as these could break your computer security. Ignore any e-mails announcing to be from your bank or someone else you hold an account with asks for personal details or passwords.

9. Websites: Be wary of websites you wish to enter. Some anti-virus programs offer warnings next to websites to indicate whether they can be trusted. Avoid clicking on a website if it is not rated as trustworthy.

10. Online Payments: If you need to make a payment online, ensure that the payment screen is protected. The page will usually indicate that it is secure and may have a padlock image at the top of the page.

Anyone still not convinced may want to keep in mind some of the events about viruses. In January 2007 a worm called Storm appeared on the scene. Few months later, it was believed that 50 million computer systems had been infected by this worm. Following these steps is a must, if you want to protect you and your personal information and data from cyber thieves.

Subscribe via RSS or Email:

Read 7455 times Last modified on Tuesday, 25 December 2012 11:38
Panagiotis K.

"Hi there , my name is Panagiotis K. and i like writing articles about computers and technology. Do not hesitate to share your ideas with me and add your comments."


  1. Latest News
  2. Most Popular
  3. Top Rated
  4. Latest Comments
  • Michael A
    Why they do not shut down the company that provides the faulty patchwork systems that make such malware first possible? No, not because of a faulty ...


  • Moubreb
    The people at any router between You and facebook can read Your communication if: 1. You're using an http: connection 2. A fake facebook certificate ...


  • theoctagon
    You could always just use what's already baked in: Android Device Manager.


  • Michael A
    AFAIR the patch was available one day after the discovery of heartbleed. That normal with Free Software. Only mislead users of commercial scrap have ...



Quick Search

Powered by Liquidtroll
Prev Next

Windows 8.1 Update 2 rumored for September 9 launch

24-05-2014 Hits:769 Microsoft Maria R. - avatar Maria R.

Windows 8.1 Update 2 rumored for September 9 launch

Microsoft is rumored to be planning to release Windows 8.1 Update 2 on September 9, according to various reports. The date coincides with the company's September Patch Tuesday, which will include...

Invasive Brain-Hacking Software May Soon Become a Reality

21-05-2013 Hits:2628 Hacking Panagiotis K. - avatar Panagiotis K.

Invasive Brain-Hacking Software May Soon Become a Reality

In the near future it may become possible to extract sensitive information from the brain with the help of invasive software or spyware. It is not really important if you want...

10 Electronic Devices That Are Nearly Impossible to Repair

04-11-2013 Hits:2379 Latest George Q - avatar George Q

10 Electronic Devices That Are Nearly Impossible to Repair

It's becoming tradition that with every new high-profile gadget release, we showcase whatever findings the repair commandos at share with us. If it's controversy and indignation you want, this is...

IDC warns cloud price cuts threaten smaller vendors

16-04-2014 Hits:912 Latest Vasia L. - avatar Vasia L.

IDC warns cloud price cuts threaten smaller vendors

Technology research firm IDC has warned that recent widespread price cuts by dominant cloud storage firms could drive smaller vendors out of business. A new report shows that cloud service providers...

You've fallen for a scam! Now what?

18-06-2014 Hits:1150 Security George Q - avatar George Q

You've fallen for a scam! Now what?

Cybercriminals tricked a friend into giving away sensitive information. Now he wants to know how “to mitigate this situation?” Don’t feel bad. We all make stupid mistakes. But with these sorts...